Delay Tolerant Networks for Disaster Scenarios

  • Andreea-Cristina Petre
  • Cristian Chilipirea
  • Ciprian Dobre
Part of the Modeling and Optimization in Science and Technologies book series (MOST, volume 3)


Disaster and emergency management refers to a range of activities designed to maintain control over crisis situations, providing the rescue and assistance equipment with a framework for helping victims and reducing its impact. The range of activities include prevention, advance warning, early detection, analysis of the problem and assessment of scope, notification of the public and appropriate authorities, mobilization of a response, containment of damage, and relief and medical care for those affected. One of the challenges in emergency scenarios is the fact that communications can be interrupted, cutting the information flow. This lack of communication infrastructure makes an appropriate response to the disaster more challenging, and leads to reduced quality of services experienced by vulnerable civilians. As an example, emergency scenarios with big agglomerations of people or traffic jams following accidents demand a unified communication infrastructure to optimize the response and decision making. This can be overcome using self-configured wireless networks, because they do not require any pre-existing infrastructure to be established, and are easy to deploy and fast to operate.  The continuous use of modern smartphones facilitates the accessibility to wireless technologies. However, when incorporating mobile smartphones into disaster assisting networks, the biggest challenge is that such wireless networks need to be specifically designed and used for supporting victims, people and assistance equipment in crisis scenarios. Because of this, in future mobile networks designed for disaster management, there is a need for new architectures and protocols, capable to adapt existing and available wireless technologies for smart data capturing and decision making. This chapter analyses specific challenges and requirements related to supporting communication in such challenged situations. We present an extensive analysis of networking solutions designed to support situations such the ones described.


Disaster Scenario Networking Delay Tolerant Networks Mobile Devices Communication and mobility support 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Chen, L.-D., et al.: Small business Internet commerce: a case study. Information Resources Management Journal (IRMJ) 3, 17–41 (2003)CrossRefGoogle Scholar
  2. 2.
    Chen, K., Tarn, J.M., Han, B.T.: Internet dependency: its impact on online behavioral patterns in e-commerce. Human Systems Management 23(1), 49–58 (2004)Google Scholar
  3. 3.
    Böhmer, M., et al.: Falling asleep with angry birds, facebook and kindle: a large scale study on mobile application usage. In: Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services. ACM (2011)Google Scholar
  4. 4.
    Ulusu, Y.: Determinant factors of time spent on Facebook: brand community engagement and usage types. Journal of Yasar University 18(5), 2949–2957 (2010)Google Scholar
  5. 5.
    Curran, K., Morrison, S., Cauley, S.M.: Google+ v Facebook: The Comparison. TELKOMNIKA (Telecommunication, Computing, Electronics and Control) 10(2), 379–388 (2012)CrossRefGoogle Scholar
  6. 6.
    Java, A., et al.: Why we twitter: understanding microblogging usage and communities. In: Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web Mining and Social Network Analysis. ACM (2007)Google Scholar
  7. 7.
    Duncombe, C.: The twitter revolution? Social media, representation and crisis in Iran and Libya. In: Australian Political Science Association Conference (APSA 2011), School of Politics & International Relations (2011)Google Scholar
  8. 8.
    Guha, S., Daswani, N.: An experimental study of the skype peer-to-peer voip system. Cornell University (2005)Google Scholar
  9. 9.
    Atzori, L., Iera, A., Morabito, G.: The Internet of things: A survey. Computer Networks 54(15), 2787–2805 (2010)CrossRefzbMATHGoogle Scholar
  10. 10.
    Shapiro, J.M.: Smart cities: quality of life, productivity, and the growth effects of human capital. The Review of Economics and Statistics 88(2), 324–335 (2006)CrossRefGoogle Scholar
  11. 11.
    Caragliu, A., Del Bo, C., Nijkamp, P.: Smart cities in Europe. Vrije Universiteit, Faculty of Economics and Business Administration (2009)Google Scholar
  12. 12.
    Mahizhnan, A.: Smart cities: the Singapore case. Cities 16(1), 13–18 (1999)CrossRefGoogle Scholar
  13. 13.
    Fuller, S.S.: Internet connectivity for hospitals and hospital libraries: strategies. Bulletin of the Medical Library Association 83(1), 32 (1995)Google Scholar
  14. 14.
    Armbrust, M., et al.: A view of cloud computing. Communications of the ACM 53(4), 50–58 (2010)CrossRefGoogle Scholar
  15. 15.
    Oyelaran-Oyeyinka, B., Lal, K.: Internet diffusion in sub-Saharan Africa: A cross-country analysis. Telecommunications Policy 29(7), 507–527 (2005)CrossRefGoogle Scholar
  16. 16.
    Woodcock, B.: Packet Clearing House. Overview of the Egyptian Internet Shutdown (2011)Google Scholar
  17. 17.
    Clayton, R.C., Murdoch, S.J., Watson, R.N.M.: Ignoring the great firewall of china. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 20–35. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  18. 18.
    Bailey, M., Labovitz, C.: Censorship and Co-option of the Internet Infrastructure, Ann Arbor, vol. 1001, p. 48104 (2011)Google Scholar
  19. 19.
  20. 20.
    Upton, E., Halfacree, G.: Meet the Raspberry Pi. Wiley (2012)Google Scholar
  21. 21.
    Feature: Airwave ‘Could Be Replaced’, Police Oracle (February 19, 2013), (last accessed June 20, 2013)
  22. 22.
    Digital Agenda Europe, (last accessed June 20, 2013)
  23. 23.
    Telecoms Internet, Europe, (last accessed June 20, 2013)
  24. 24.
    TETRA standard and applications, (last accessed June 20, 2013)
  25. 25.
    The evolution of TETRA, white paper, (last accessed June 20, 2013)
  26. 26.
    The MESA project, (last accessed June 20, 2013)
  27. 27.
    Chiti, F., Fantacci, R., Maccari, L., Marabissi, D., Tarchi, D.: A broadband wireless communications system for emergency management. Wireless Communications 15(3), 8–14 (2008)CrossRefGoogle Scholar
  28. 28.
    Durantini, A., Petracca, M., Vatalaro, F., Civardi, A., Ananasso, F.: Integration of Broadband Wireless Technologies and PMR Systems for Professional Communications. In: Fourth International Conference on Networking and Services, ICNS 2008, March 16-21, pp. 84–89 (2008)Google Scholar
  29. 29.
    Barakat, C., Altman, E., Dabbous, W., "On, T.C.P.: performance in a heterogeneous network: a survey. IEEE Communications Magazine 38(1), 40–46 (2000)CrossRefGoogle Scholar
  30. 30.
    Magalhaes, L., Kravets, R.: Transport level mechanisms for bandwidth aggregation on mobile hosts. In: Ninth International Conference on Network Protocols 2001, November 11-14, pp. 165–171 (2001)Google Scholar
  31. 31.
    Barré, S., Paasch, C., Bonaventure, O.: MultiPath TCP: From Theory to Practice. In: Domingo-Pascual, J., Manzoni, P., Palazzo, S., Pont, A., Scoglio, C. (eds.) NETWORKING 2011, Part I. LNCS, vol. 6640, pp. 444–457. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  32. 32.
    Nguyen, S.C., Nguyen, T.M.T.: Evaluation of multipath TCP load sharing with coupled congestion control option in heterogeneous networks. In: Global Information Infrastructure Symposium (GIIS 2011), August 4-6, pp. 1–5 (2011)Google Scholar
  33. 33.
    Terrestrial Trunked Radio (TETRA), Voice plus Data (V+D), Part 7: Security, ETSI EN 300 392-7 V3.2.1 (2010-06)Google Scholar
  34. 34.
    Terrestrial Trunked Radio (TETRA), Direct Mode Operation (DMO), Part 6: Security, ETSI EN 300 396-6 V1.4.1 (2010-07)Google Scholar
  35. 35.
    Spyropoulou, E., Agar, C., Levin, T., Irvine, C.: IPsec Modulation for Quality of Security Service. In: Proceedings of the International Systems Security Engineering Conference (2002)Google Scholar
  36. 36.
    The Loon project (June 24, 2013), (last accessed June 20, 2013)
  37. 37.
    International Telecommunication Union (October 2010)Google Scholar
  38. 38.
    The new mobile world order, (last accessed June 20, 2013)
  39. 39.
    Erricson, Mobility report, (last accessed June 20, 2013)
  40. 40.
    50 billion devices online by 2020, The Telegraph (January 31, 2012), (last accessed June 20, 2013)
  41. 41.
  42. 42.
    Vahdat, A., Becker, D.: Epidemic routing for partially connected ad hoc networks. Technical Report CS-200006, Duke University (2000)Google Scholar
  43. 43.
    Spyropoulos, T., Psounis, K., Raghavendra, C.S.: Single-copy routing in intermittently connected mobile networks. In: Proc. of First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004), pp. 235–244 (October 2004)Google Scholar
  44. 44.
    Hui, P., Crowcroft, J.: BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks. IEEE Transactions on Mobile Computing 10(11), 1576–1589 (2011)CrossRefGoogle Scholar
  45. 45.
    Moreira, W., Mendes, P., Sargento, S.: Opportunistic routing based on daily routines. In: Proc. of IEEE Int. Symp. World of Wireless, Mobile and Multimedia Networks (WoWMoM 2012), pp. 1–6 (June 2012)Google Scholar
  46. 46.
    Hui, P., Crowcroft, J.: How Small Labels Create Big Improvements. In: Proc. of the 5th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW 2007), Washington, DC, USA, pp. 65–70 (2007)Google Scholar
  47. 47.
    Lindgren, A., Doria, A., Schelen, O.: Probabilistic Routing in Intermittently Connected Networks. SIGMOBILE Mob. Comput. Commun. Rev. 7(3), 19–20 (2003)CrossRefGoogle Scholar
  48. 48.
    Anh Nguyen, H., Giordano, S., Puiatti, A.: Probabilistic Routing Protocol for Intermittently Connected Mobile Ad hoc Network (PROPICMAN). In: Proc. of IEEE Int. Symp. on World of Wireless, Mobile and Multimedia Networks (WoWMoM 2007), pp. 1–6 (June 2007)Google Scholar
  49. 49.
    Luqman, F.: TRIAGE: Applying context to improve timely delivery of critical data in mobile ad hoc networks for disaster response. In: Pervasive Computing and Communications 2011 IEEE International Conference on Workshops (PERCOM Workshops), March 21-25, pp. 407–408 (2011)Google Scholar
  50. 50.
    Yu, F.R., Jie, Z., Tang, H., Chan, H.C.B., Leung, V.C.M.: Enhancing interoperability in heterogeneous mobile wireless networks for disaster response. IEEE Transactions on Wireless Communications 8(5), 2424–2433 (2009)CrossRefGoogle Scholar
  51. 51.
    Cayirci, E., Coplu, T.: SENDROM: sensor networks for disaster relief operations management. Wireless Networks 13(3), 409–423 (2007)CrossRefGoogle Scholar
  52. 52.
    Fujihara, A., Miwa, H.: Real-time Disaster Evacuation Guidance using Opportunistic Communications. In: The 2012 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2012), pp. 326–331 (2012)Google Scholar
  53. 53.
    Fujihara, A., Miwa, H.: Effect of Traffic Volume in Real-time Disaster Evacuation Guidance using Opportunistic Communications. In: Third International Conference on Intelligent Networking and Collaborative Systems (INCoS 2012), pp. 457–462 (2012)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Andreea-Cristina Petre
    • 1
  • Cristian Chilipirea
    • 1
  • Ciprian Dobre
    • 1
  1. 1.Computer Science DepartmentUniversity Politehnica of BucharestBucharestRomania

Personalised recommendations